Sciweavers

1130 search results - page 178 / 226
» Developing Trust In Virtual Software Development Teams
Sort
View
116
Voted
HICSS
2002
IEEE
123views Biometrics» more  HICSS 2002»
15 years 8 months ago
An Ontology-Based HTML to XML Conversion Using Intelligent Agents
How to organize and classify large amounts of heterogeneous information accessible over the Internet is a major problem faced by industry, government, and military organizations. ...
Thomas E. Potok, Mark T. Elmore, Joel W. Reed, Nag...
EUROSYS
2008
ACM
16 years 18 days ago
Flicker: an execution infrastructure for tcb minimization
We present Flicker, an infrastructure for executing securitysensitive code in complete isolation while trusting as few as 250 lines of additional code. Flicker can also provide me...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...
GIS
2007
ACM
16 years 4 months ago
High-level web service for 3D building information visualization and analysis
This paper presents an approach to visualize and analyze 3D building information models within virtual 3D city models. Building information models (BIMs) formalize and represent d...
Benjamin Hagedorn, Jürgen Döllner
128
Voted
ISW
2007
Springer
15 years 9 months ago
Detecting System Emulators
Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be a...
Thomas Raffetseder, Christopher Krügel, Engin...
155
Voted
DSN
2006
IEEE
15 years 7 months ago
Efficiently Detecting All Dangling Pointer Uses in Production Servers
In this paper, we propose a novel technique to detect all dangling pointer uses at run-time that is efficient enough for production use in server codes. One idea (previously used ...
Dinakar Dhurjati, Vikram S. Adve